Analysis
-
max time kernel
68s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27-03-2023 20:45
Static task
static1
Behavioral task
behavioral1
Sample
ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74.exe
Resource
win10-20230220-en
General
-
Target
ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74.exe
-
Size
695KB
-
MD5
399dac108b9fd8da34f8579cd6521bb9
-
SHA1
6b5bfda81085869f3fa761691abe4dded2100209
-
SHA256
ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74
-
SHA512
8573cab7778d498eb08c03db8b79c5ced4ee27e713ab6efc2799f4500f323dda027fdfe78f97fa0593e17d71e39b59c49ffa5b54c7c90db062dd55e8f829dc49
-
SSDEEP
12288:kMrvy90V5ibYrqBJpolQkkjRHkcvDtEaSf7MRNZDA1B1/t1zq5MJmHHmxsHheTmI:TyvcGsPWRE0xyMpAxt1qWQGxo0iI
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1540.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4416-177-0x0000000002400000-0x0000000002446000-memory.dmp family_redline behavioral1/memory/4416-178-0x00000000025A0000-0x00000000025E4000-memory.dmp family_redline behavioral1/memory/4416-179-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-180-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-182-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-184-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-186-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-188-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-190-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-198-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-194-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-200-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-202-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-204-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-206-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-208-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-210-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-212-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-214-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/4416-216-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2272 un539911.exe 2456 pro1540.exe 4416 qu2680.exe 1376 si613475.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1540.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1540.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un539911.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un539911.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2456 pro1540.exe 2456 pro1540.exe 4416 qu2680.exe 4416 qu2680.exe 1376 si613475.exe 1376 si613475.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2456 pro1540.exe Token: SeDebugPrivilege 4416 qu2680.exe Token: SeDebugPrivilege 1376 si613475.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2272 1560 ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74.exe 66 PID 1560 wrote to memory of 2272 1560 ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74.exe 66 PID 1560 wrote to memory of 2272 1560 ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74.exe 66 PID 2272 wrote to memory of 2456 2272 un539911.exe 67 PID 2272 wrote to memory of 2456 2272 un539911.exe 67 PID 2272 wrote to memory of 2456 2272 un539911.exe 67 PID 2272 wrote to memory of 4416 2272 un539911.exe 68 PID 2272 wrote to memory of 4416 2272 un539911.exe 68 PID 2272 wrote to memory of 4416 2272 un539911.exe 68 PID 1560 wrote to memory of 1376 1560 ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74.exe 70 PID 1560 wrote to memory of 1376 1560 ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74.exe 70 PID 1560 wrote to memory of 1376 1560 ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74.exe"C:\Users\Admin\AppData\Local\Temp\ff5bb9c77ce1783a00aa8908e7fe12aba9a085d60d4294685520234952646c74.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un539911.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un539911.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1540.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1540.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2680.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2680.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si613475.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si613475.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b3f1c8e101e88a2b0d78bc3eace6a967
SHA113275e396b3e024c9ea8c29ed6687ddaf744738f
SHA2564ffb07fa6fc4b9d15e60a3fed1d68480a9c8e298abc92ddc009bd205f6d8e4a4
SHA5126c0ebbb8ab80908a9362473860d0cdd4154d0b719fd9a1f93e64c9d123b4c8b3cd203f9a3d0fa71cddef10bc24b480de472400add20af9cd37e680ae677a0b1d
-
Filesize
175KB
MD5b3f1c8e101e88a2b0d78bc3eace6a967
SHA113275e396b3e024c9ea8c29ed6687ddaf744738f
SHA2564ffb07fa6fc4b9d15e60a3fed1d68480a9c8e298abc92ddc009bd205f6d8e4a4
SHA5126c0ebbb8ab80908a9362473860d0cdd4154d0b719fd9a1f93e64c9d123b4c8b3cd203f9a3d0fa71cddef10bc24b480de472400add20af9cd37e680ae677a0b1d
-
Filesize
553KB
MD5ab0a44c458a1f9165032f1196ad185ec
SHA1009cf992ef5c71c99e14a14ba78077676fa37148
SHA256ad4d9346103a9ed380792c3463aeab8d9ed7c49c269e71a0769ce06247f5267a
SHA512c6150531ca22a756fb85baa554743993e67b49cc03f0fe726325319e268e893b8d44819cf73193f745f82aed8529a6a4c066b222b0c02c742e7c3dda80738406
-
Filesize
553KB
MD5ab0a44c458a1f9165032f1196ad185ec
SHA1009cf992ef5c71c99e14a14ba78077676fa37148
SHA256ad4d9346103a9ed380792c3463aeab8d9ed7c49c269e71a0769ce06247f5267a
SHA512c6150531ca22a756fb85baa554743993e67b49cc03f0fe726325319e268e893b8d44819cf73193f745f82aed8529a6a4c066b222b0c02c742e7c3dda80738406
-
Filesize
308KB
MD5602052a807f92a887a1d1dad31672d9f
SHA10877ab1ac2365f8f8bf6ff3d68757299ee4252f3
SHA2568b005cc985745bc13a9d26198bfec30bd685948e2bf2dbba10cae4a428c9c07c
SHA512f6feefd0fba495124bdc9ee4bea10fb6db2daa58711a1f0534ddf99a0fe7982c84fa8fac2bc904858e81f46b4f736bdaace93bf4c8d87443a1e5efe11c5ddf0f
-
Filesize
308KB
MD5602052a807f92a887a1d1dad31672d9f
SHA10877ab1ac2365f8f8bf6ff3d68757299ee4252f3
SHA2568b005cc985745bc13a9d26198bfec30bd685948e2bf2dbba10cae4a428c9c07c
SHA512f6feefd0fba495124bdc9ee4bea10fb6db2daa58711a1f0534ddf99a0fe7982c84fa8fac2bc904858e81f46b4f736bdaace93bf4c8d87443a1e5efe11c5ddf0f
-
Filesize
366KB
MD51c5e6d86c501548f9b73433c672e7861
SHA1d1f3ba5194d3aa70239ed7b32ffa5b1680d8edfd
SHA256a325b93ffad1072157194287e2d290314bf450f1b38e8323517307a27d047a62
SHA5123b5dd69ecfd5446585e1a11f0236e693bcd2ea366315e5150fa98dfdb18fa61aa88acf2adc4e32da9ba1484b633a04c74c5c638275c6d4bf7ee85660a3fa51b2
-
Filesize
366KB
MD51c5e6d86c501548f9b73433c672e7861
SHA1d1f3ba5194d3aa70239ed7b32ffa5b1680d8edfd
SHA256a325b93ffad1072157194287e2d290314bf450f1b38e8323517307a27d047a62
SHA5123b5dd69ecfd5446585e1a11f0236e693bcd2ea366315e5150fa98dfdb18fa61aa88acf2adc4e32da9ba1484b633a04c74c5c638275c6d4bf7ee85660a3fa51b2